Course Title: Cisco Certified Support Technician (CCST) โ€“ Cybersecurity

Categories:

Level: Beginner / Entry-Level
Prerequisites: Basic computer and internet skills; no prior cybersecurity experience required
Certification: Cisco Certified Support Technician โ€“ Cybersecurity (Official Cisco Credential)
Delivery Partner: Thakral Global Learning


๐ŸŒŸ Course Overview:

This course prepares learners for the Cisco Certified Support Technician โ€“ Cybersecurity certification, which validates entry-level skills in protecting digital environments. Developed by Cisco and Certiport, this program is designed for aspiring cybersecurity professionals, students, and early-career individuals seeking to understand the principles of digital security, cyber threats, defense techniques, and ethical practices.

Learners gain hands-on exposure to cybersecurity tools, threat analysis, risk mitigation, and basic security policiesโ€”building a strong foundation for further career growth or advanced certifications like CompTIA Security+ or Cisco CCNA Security.


โœ… Learning Outcomes:

By the end of the course, learners will be able to:

  • Understand the core concepts and vocabulary of cybersecurity
  • Identify common threat types and vulnerabilities
  • Explain basic security principles, models, and frameworks
  • Apply cybersecurity practices in securing devices, networks, and data
  • Use essential tools for threat detection and mitigation
  • Prepare confidently for the Cisco CCST Cybersecurity certification exam

๐Ÿ“š Course Modules:

1. Essential Security Principles

1.1 Define essential security principles

  • Vulnerabilities, threats, exploits, and risks
  • Attack vectors; hardening; defense-in-depth
  • Confidentiality, integrity, and availability (CIA)
  • Types of attackers and reasons for attacks
  • Code of ethics

1.2 Explain common threats and vulnerabilities

  • Malware, ransomware, denial of service, botnets
  • Social engineering attacks (tailgating, spear phishing, phishing, vishing, smishing)
  • Physical attacks, man-in-the-middle
  • IoT vulnerabilities, insider threats, Advanced Persistent Threats (APT)

1.3 Explain access management principles

  • Authentication, authorization, and accounting (AAA)
  • RADIUS, multifactor authentication (MFA)
  • Password policies

1.4 Explain encryption methods and applications

  • Types of encryption, hashing, certificates, public key infrastructure (PKI)
  • Strong vs. weak encryption algorithms
  • States of data and appropriate encryption (data in transit, data at rest, data in use)
  • Protocols that use encryption

2. Basic Network Security Concepts

2.1 Describe TCP/IP protocol vulnerabilities

  • TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS

2.2 Explain how network addresses impact network security

  • IPv4 and IPv6 addresses, MAC addresses
  • Network segmentation, CIDR notation, NAT
  • Public vs. private networks

2.3 Describe network infrastructure and technologies

  • Network security architecture, DMZ, virtualization, cloud
  • Honeypot, proxy server, IDS, IPS

2.4 Set up a secure wireless SoHo network

  • MAC address filtering, encryption standards and protocols, SSID

2.5 Implement secure access technologies

  • ACL, firewall, VPN, NAC

3. Endpoint Security Concepts

3.1 Describe operating system security concepts

  • Windows, macOS, and Linux
  • Security features, including Windows Defender and host-based firewalls
  • CLI and PowerShell; file and directory permissions; privilege escalation

3.2 Demonstrate familiarity with appropriate endpoint tools that gather security assessment information

  • Netstat, nslookup, tcpdump

3.3 Verify that endpoint systems meet security policies and standards

  • Hardware and software inventory, program deployment
  • Data backups, regulatory compliance (PCI DSS, HIPAA, GDPR)
  • BYOD (device management, data encryption, app distribution, configuration management)

3.4 Implement software and hardware updates

  • Windows Update, application updates, device drivers, firmware, patching

3.5 Interpret system logs

  • Event Viewer, audit logs, system/application logs, syslog
  • Identification of anomalies

3.6 Demonstrate familiarity with malware removal

  • Scanning systems, reviewing scan logs, malware remediation

4. Vulnerability Assessment and Risk Management

4.1 Explain vulnerability management

  • Vulnerability identification, management, and mitigation
  • Active and passive reconnaissance; port scanning, automation

4.2 Use threat intelligence techniques to identify potential network vulnerabilities

  • Vulnerability databases, industry-standard tools for assessments
  • CVEs, cybersecurity reports, and collective intelligence

4.3 Explain risk management

  • Vulnerability vs. risk, ranking risks, risk mitigation strategies
  • Risk levels (low, medium, high, extremely high)
  • Security assessments of IT systems

4.4 Explain the importance of disaster recovery and business continuity planning

  • Natural and human-caused disasters
  • Disaster recovery plans (DRP) and business continuity plans (BCP)
  • Backup, disaster recovery controls (detective, preventive, and corrective)

5. Incident Handling

5.1 Monitor security events and know when escalation is required

  • Role of SIEM and SOAR
  • Monitoring network data to identify security incidents

5.2 Explain digital forensics and attack attribution processes

  • Cyber Kill Chain, MITRE ATT&CK Matrix, Diamond Model
  • Tactics, Techniques, and Procedures (TTP)
  • Evidence handling (preserving digital evidence, chain of custody)

5.3 Explain the impact of compliance frameworks on incident handling

  • Compliance frameworks (GDPR, HIPAA, PCI-DSS, FERPA, FISMA)
  • Reporting and notification requirements

5.4 Describe the elements of cybersecurity incident response

  • Policy, plan, and procedure elements
  • Incident response lifecycle stages (NIST Special Publication 800-61)

๐Ÿ› ๏ธ Practical Tools & Simulations:

  • Cisco Packet Tracer (for basic network security labs)
  • Browser-based cybersecurity scenarios
  • Security tools simulations: antivirus, password managers, firewall settings
  • Cybersecurity games and challenges

๐Ÿ’ผ Career Opportunities:

  • Cybersecurity Technician
  • Security Support Associate
  • IT Support with Cybersecurity focus
  • SOC Analyst (Entry-Level)
  • Pathway to roles like Cybersecurity Analyst, Ethical Hacker, or Network Security Specialist

๐ŸŽ“ Why Choose Thakral Global Learning?

  • Official Cisco-aligned curriculum delivered by experienced trainers
  • Hands-on, skills-based learning
  • Guided exam preparation for CCST Cybersecurity
  • Access to Cisco and Certiport learning materials
  • Personalized mentorship and career advice